Our Blog

Articles, Reviews and Technical Alerts

Current Filter: phishing

Beware of Fake QuickBooks Email

Tim Summers
Technology Alert

Be on the lookout for fake Intuit QuickBooks related emails. Never click a link or button within any email that asks you to enter your account login credentials or update your account.

Beware of Fake Windows Defender Warning

Tim Summers
Technology Alert

Some customers are reporting a fake Windows Defender screen that appears while they are browsing the Internet.

How to run a Malwarebytes Scan (Retail Edition)

Tim Summers
How To

If you have the retail version of Malwarebytes installed on your Windows computer, you can easily run a full scan to check your computer for malware infections that might not be detected by your antivirus software.

How to run an AVAST Antivirus Scan

Tim Summers
How To

If you are running the retail edition of AVAST antivirus, the business edition of AVAST antivirus or the AVAST Cloudcareedition of antivirus, you can follow these steps to run a scan of your computer.

How do you know if your mailbox was hacked?

Tim Summers
Technical Support

Email can be hacked in a variety of ways. One such method is tricking people into opening an infected email attachment. Once opened, the email account and contact list can become vulnerable to the hacker.

Five Key Steps to Improving the Cybersecurity of Your Business

Tim Summers
Information

Unfortunately, there’s no way to provide 100% complete protection from hackers and spammers. But don’t despair, that’s no reason to throw out all the computers and go back to paper and pencil. There are recommended best practices for businesses to follow that can help better protect your network, your Windows devices, and your business-critical data.

It only takes one wrong click to infect your entire office network!

Tim Summers
Information

Educate your staff how to recognize a phishing attempt (ie. fake email or fake website).

It’s one of the best and cheapest methods to defend your office from hacking and virus infection.

Ten Steps To Take When Your Email Account is Hacked

Tim Summers
Technical Support

It can happen to anyone. Sometimes all it takes is opening an infected email attachment or entering your email username and password into a website portal that turns out to be fake. Unfortunately, with the way digital technology works, if you're connected to the internet, you can be hacked. Here are ten steps you should take when your email account is hacked.

SCAM Melecia The Qualified Photographer

Tim Summers
Information

Diversified customers report receiving emails or form submissions through their website from people claiming to be photographers. These emails claim that photos used on the customer's website are stolen. The intent of the sender is to convince the recipient of the email to click on hyperlinks within the email thereby opening themselves up to virus infection.

 

<<
page 1 of 2
Dayton and Miami Valley Better Business Bureau, A+ Rating
Vandalia Ohio Chamber of Commerce Member
DELL Premier Partner, Computer Hardware and Software
Microsoft Partner Logo
Google Workspace Logo
Avast Anti-Virus
Carbonite Registered Partner, Remote Backup
eVault from Carbonite, Remote Backup
Wathguard Firewall Routers and Security Appliances
Sonicwall Firewall Routers and Security Appliances
Business Networking International (BNI), Referral Group